Fraud Analytics Techniques Moving Into Security
Bruno Motta Rego
@brunomottarego
Agenda
Scenario
How Fraud Works
Techniques
Layers
Brand Protection
Challenge
Scenario
Text
Pump and Dump
Data Breach
BREACH TRENDS
!
IN 60% OF CASES, ATTACKERS ARE ABLE TO COMPROMISE
AN ORGANIZATION WITHIN MINUTES.
!
PHISHING
!
23% OF RECIPIENTS NOW OPEN PHISHING MESSAGES AND
11% CLICK ON ATTACHMENTS.
!
NEARLY 50% OPEN E-MAILS AND CLICK ON PHISHING LINKS
WITHIN THE FIRST HOUR.
!
VULNERABILITIES
!
99.9% OF THE EXPLOITED VULNERABILITIES WERE
COMPROMISED MORE THAN A YEAR AFTER THE CVE WAS
PUBLISHED.
How Fraud Works
How it works
So…
Account takeover.
Identity fraud.
Use of stolen financial account.
Key Findings
Attackers identify the least resistance point, and they perform their attacks
avoiding common fraud detection rules.
Fraudsters are exploiting human weaknesses. Tools cannot detect or
prevent social engineering.
Monitor your business. Anti-Fraud system, security layers and adaptive
access control must being incorporated with SIEM, identity systems and
other security vendors to monitor the users/customers behavior trends.
Techniques
Brand Protection.
Customer Awareness.
Endpoint-centric.
Navigation-centric.
Multi-channel, Holistic, Account-centric.
Layers: InfoSec & Anti-Fraud
Brand
Protection
Customer Awareness
DMARC
DNSSec
TLS/SSL
DMARC and the Email Authentication Process
Minimize false positives.
Provide robust authentication
reporting.
Assert sender policy at receivers.
Reduce successful phishing delivery.
Work at Internet scale.
Minimize complexity.
DMARC (DKIM + SPF)
source: DMARC Overview https://dmarc.org/overview/
Challenge yourself. Challenge your vendor.
Understand the broader campaign.
Exchange of Information with your market segment and also competitor.
Remember: your business is more than compliance standpoints.
Challenge Ourselves
@brunomottarego
Obrigado

Fraud Analytics Techniques Moving Into Security